Protecting online informational privacy

Internet privacy is a subset of the larger world of data privacy that covers the collection, use, and secure storage of PI generally. Internet privacy is concerned primarily with how PI is exposed over the Web, through tracking, data collection, data sharing, and cyber security threats. The global spread of COVID-19 has generated numerous privacy, data…

Cyber Crimes and Characterisitcs

The development of technology gave rise to a computer-related crime, which is, cybercrime. These crimes are just like the attack on the secured information of people, corporations, or governments. These attacks aren’t on the human body but the virtual body. Cybercrime is an uncontrollable evil having its base within the misuse of growing dependence on…

Classification of Cyber Crimes

Cybercrimes are classified into four categories: i. Crime against an individual:  Unauthorized control/access over computer system or hacking: Gaining access to any computer, computer system or computer network without the permission of the rightful owner.  Dissemination of obscene material: Indecent exposure or pornography (normally child pornography) or hoisting of prohibited websites which may…

Causes and how to prevent Cybercrime

Following are the causes of cybercrimes: i. Huge capacity to store data: The computer features in carrying a huge amount data on a little space. This makes easier for a cybercriminal to get easy access to that data and he can also get secret and official data and can misuse them for his personal profit….

CERTIFYING AUTHORITY IN CYBER LAW(PART 2)

A Certificate Authority (or Certification Authority) is an entity that issues digital certificates that contain a public key and therefore the identity of the owner. The private key is not made available to the public in general but kept secret by the end-user who generates the key pair. Further, the certificate is also working as…

CERTIFYING AUTHORITY IN CYBER LAW (PART 1)

A Certificate Authority (or Certification Authority) is an entity that issues digital certificates that contain a public key and therefore the identity of the owner. The private key’s not made available to the general public generally but kept secret by the end-user who generates the key pair. Further, the certificate is also working as a…

The Personal Data Protection Bill, 2019

The Personal Data Protection Bill, 2019 was introduced in Lok Sabha on December 11, 2019. The Bill seeks to supply for cover of private data of a private , and establishes a knowledge Protection Authority. • Applicability: The Bill provides for the processing of private data by: (i) Government, (ii) Companies incorporated in India, and…

Personal data and data protection

Data is of two types: a. personal and b. non-personal data. Personal means those characteristics, traits or attributes of identity that can be used to identify an individual. Non-personal data includes aggregated data through which an individual cannot be identified. Data protection means to protect or to minimise intrusion into the privacy of an individual…

Women Empowerment in India

Women Empowerment in India has become the most important matter of discussion in recent times because women in the earlier were not given the equal role, status, value and affection in the society. So all around the world that how to improve the status of the women in society and how should they get the…

Search and Seizer in Cyber Crime investigation

The Cybercrime has no physical boundaries. The criminals seeking information stored in computers with dial-in-access can access the information virtually from anywhere. The quantity of data that can be stolen or the level and amount of damage that can be caused by malicious programming code may be limited only by the speed of the network…

Search and Seizure in Cyber Crime Cases

Search and Seizer in Cyber Crime investigation The Cybercrime has no physical boundaries. The criminals seeking information stored in computers with dial-in-access can access the information virtually from anywhere. The quantity of data that can be stolen or the level and amount of damage that can be caused by malicious programming code may be limited…